Tuesday 19 November 2013

Classifications of hackers

White hat
A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement.

Black hat
A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" .Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network.

Grey hat
A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked. 

Saturday 28 September 2013

Penetration testing methodology




Information gathering

Network mapping

Vulnerability identification


Penetration

Gaining access and escalation

Enumerating further

Compromising remote user/sites

Maintaining Access

Covering tracks

Sunday 15 September 2013

New Features in Windows 8

New Features in Windows 8


  • Start  screen 
  • Cloud integration
  • Reset  and  r efresh  y our PC
  • Windows To Go
  • Remote Desktop Services
  • Hyper- V
  • Support for multiple processor architectures

Sunday 8 September 2013

Hardware Requirements for Installing Windows 8

Hardware Requirements for Installing Windows 8 

  1.   1  gigahertz ( GHz )  or faster processor 
  2.   1 GB RAM (32- bit) or 2 GB RAM (64- bit) 
  3.   16 GB available hard  disk space  (32 - bit) or 20 GB (64- bit) 
  4.   DirectX®9 graphics device with a Windows Display Driver Model ( WDDM)  1.0 or  newer  driver 

Thursday 18 July 2013

Microsoft Virtual Academy

Successful technologists never stop learning and great technology never stops evolving. Microsoft Virtual Academy (MVA) offers online Microsoft training delivered by experts to help technologists continually learn, with hundreds of courses, in 11 different languages. Our mission is to help developers, knowledgeable IT professionals and advanced students learn the latest technology, build their skills, and advance their careers. MVA is free of charge, and the entire service is hosted on Windows Azure.
Become an MVA member so that you can earn points for your learning, achieve different levels of badges and status relative to others in your country or around the world, and get certificates when you complete an entire course. Your personal dashboard helps you track your progress against your personal learning plans.
MVA learning opportunities combine on-demand courses and live events: 
  • On-demand courses help you learn at your own pace, and when the time is right for your busy schedule.
  • MVA’s exciting live events include Jump Start training and MVA Live Q&A where you can interact with experts, and a worldwide audience of learners from around the world. Our instructors and subject matter experts will answer the questions you pose in real time chat sessions so that you can apply what you learn right away.
Developers who want to learn how to build apps for the web, Windows or Windows Phone can explore our courses on App Development training, HTML5 training, C# training, and Windows Phone app development.
IT Pros who are looking to evaluate, deploy, administer, update, and manage infrastructure in their organization should checkout our online courses on Windows Server training, Windows 8 training, Windows Azure training, and Microsoft Virtualization.

Tuesday 16 July 2013

Penetration testing


A penetration test is a method of evaluating the computer security of a computer system or network by simulating an attack from external threats and internal threats. The process involves an active analysis of the system for any potential vulnerabilities that could result from poor or improper system configuration, both known and unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures. This analysis is carried out from the position of a potential attacker and can involve active exploitation of security vulnerabilities.Security issues uncovered through the penetration test are presented to the system's owner.Effective penetration tests will couple this information with an accurate assessment of the potential impacts to the organization and outline a range of technical and procedural countermeasures to reduce risks.

Saturday 13 July 2013

Red Hat Certifications

System administrators, engineers, and architects
Red Hat Certified System Administrator (RHCSA)
Red Hat Certified Engineer (RHCE)
Red Hat Certificate of Expertise in Security Network Services
Red Hat Certificate of Expertise in Deployment and Systems Management
Red Hat Certificate of Expertise in Directory Services and Authentication
Red Hat Certificate of Expertise in SELinux Policy Administration
Red Hat Certificate of Expertise in Clustering and Storage Management
Red Hat Certificate of Expertise in Performance Tuning
Red Hat Certificate of Expertise in Server Hardening - Coming soon
Red Hat Certified JBoss Administrator (RHCJA)
Red Hat Certified Security Specialist (RHCSS)
Red Hat Certified Datacenter Specialist (RHCDS)
Red Hat Certified Architect (RHCA)
Enterprise developers and application administrators
Red Hat Certified JBoss Developer (RHCJD)
Red Hat Certificate of Expertise in Persistence
Red Hat Certificate of Expertise in Seam
Red Hat Certificate of Expertise in ESB
Red Hat Certificate of Expertise in Camel Development - Coming soon
Red Hat Certified JBoss Administrator (RHCJA)
Cloud and virtualization administrators
Red Hat Certified Virtualization Administrator (RHCVA)
Red Hat Certificate of Expertise in Hybrid Cloud Storage
Red Hat Certificate of Expertise in OpenStack IaaS - Coming soon

(source:website)

Saturday 6 July 2013

CompTIA Certifications

CompTIA has four IT certification series that test different knowledge standards, from entry-level to expert.


CompTIA Mastery Series

CompTIA mastery certifications cover the advanced practice of a specific discipline. Mastery certification candidates must be able to integrate multiple enterprise disciplines through the application of advanced skills. Mastery certifications can be taken as a standalone credential or as an advanced step in a specific certification career path.
CompTIA Advanced Security Practitioner (CASP): Covers enterprise security; risk management; research and analysis; and integration of computing, communications, and business disciplines.


CompTIA Professional Series

CompTIA professional certifications cover the technical skills and knowledge needed to succeed in a specific IT career.
CompTIA A+: Covers preventative maintenance, basic networking, installation, troubleshooting, communication and professionalism.

CompTIA CDIA+: Covers the knowledge and skills needed in the document imaging sales field, including planning, designing and specifying a document imaging management system.

CompTIA Cloud+: Covers standard methodology required to securely implement and maintain cloud technologies.

CompTIA CTT+: Covers the knowledge and skills needed for the technical training field, including classroom preparation, presentation, communication, facilitation and evaluation in both traditional classroom and virtual classroom environments.

CompTIA Linux+ Powered by LPI: Covers user administration, file permissions, software configurations and the fundamental management of Linux systems.

CompTIA Mobile App Security+: Covers the knowledge and skills required to securely create a native iOS or Android mobile application, while also ensuring secure network communications and backend web services.

CompTIA Mobility+: Covers the knowledge and skills required to understand and research capabilities of various mobile devices and aspects of over-the-air technologies.

CompTIA Network+: Covers managing, maintaining, troubleshooting, operating and configuring basic network infrastructure.

CompTIA PDI+: Covers the knowledge and skills needed for technicians in the printer and document-imaging field, such as basic electromechanical components and tools, print engine and scan processes, color theory and networking.

CompTIA Project+: Covers the entire process of project management, including initiation, planning, execution, acceptance, support and closure.

CompTIA Security+: Covers system security, network infrastructure, cryptography, assessments and audits.

CompTIA Server+: Covers areas such as RAID, SCSI, managing multiple CPUs and disaster recovery.

CompTIA Storage+ Powered by SNIA: Covers storage components, connectivity, storage management, data protection and storage performance.


CompTIA Specialty Series

CompTIA specialty certifications cover the business and technical knowledge needed for specific vertical or niche markets. Specialty certifications can be taken in combination with other CompTIA certifications or can be taken on their own by business and IT professionals.
CompTIA Cloud Essentials: Covers what cloud computing means from a business and technical perspective, as well as what is involved in moving to and governing the cloud.

CompTIA Green IT: Covers the knowledge needed to implement environmentally sound techniques within an organization's IT infrastructure.

CompTIA Healthcare IT Technician: Covers the knowledge needed to implement, deploy, and support healthcare IT systems in various clinical settings.

CompTIA IT for Sales: Covers the professional knowledge in technology basics necessary to complete sales activities with customers in technical fields.

Social Media Security Professional: Covers the knowledge and skills needed to mitigate security risks to business posed by social networking channels.


CompTIA Basic Series

CompTIA basic certifications cover foundational topics and issues in IT and are suited for individuals looking to enter jobs that involve computers.
Strata IT Fundamentals: Covers the basic understanding of PC components, functionality, compatibility and related technology topics.

(source:website)

Friday 5 July 2013

Cisco Career Certifications

Entry
Both the CCENT and the CCT certifications serve as starting points for individuals interested in starting a career as a networking professional.

Entry Certifications
CCENT
CCT

Associate
The Associate level of Cisco Certifications can begin directly with CCNA for network installation, operations and troubleshooting or CCDA for network design. Think of the Associate Level as the foundation level of networking certification.

Associate Certifications
CCNA Routing and Switching
CCDA
CCNA Data Center
CCNA Security
CCNA Service Provider
CCNA Service Provider Operations
CCNA Video
CCNA Voice
CCNA Wireless

Professional
The Professional level is an advanced level of certification that shows more expertise with networking skills. Each certification covers a different technology to meet the needs of varying job roles.

Professional Certifications
CCDP
CCNP
CCNP Data Center
CCNP Security
CCNP Service Provider
CCNP Service Provider Operations
CCNP Voice
CCNP Wireless

Expert
The Cisco Certified Internetwork Expert (CCIE) certification is accepted worldwide as the most prestigious networking certification in the industry.
Expert Certifications
CCDE
CCIE Collaboration
CCIE Data Center
CCIE Routing & Switching
CCIE Security
CCIE Service Provider
CCIE Service Provider Operations
CCIE Storage Networking (Retiring July 1, 2013)
CCIE Voice (Retiring February 13, 2014)
CCIE Wireless

Architect
Cisco Certified Architect is the highest level of accreditation achievable and recognizes the architectural expertise of network designers who can support the increasingly complex networks of global organizations and effectively translate business strategies into evolutionary technical strategies.

Architect Certification
CCAr


(source : website)

Wednesday 5 June 2013

Friday 31 May 2013

Tuesday 28 May 2013

How to increase Mozilla Firefox speed


1) Open Mozilla Firefox.

2) In the address bar type: “about:config”.

3)Look for were it says“network.http.pipelining” to TRUE (Double Click it until it says TRUE).

4)Look for “network.http.proxy.pipelining” to TRUE (Also double click this until it says TRUE).

5) Now. Right-Click Anywhere then click “Create New” Then “Integer. Name it ''nglayout.initialpaint.delay''Then Click Ok, then put the number “0" (Zero) in the next box.

6) Click OK.

7) Restart Firefox. Feel The Difference in Speed.

Saturday 25 May 2013

Windows Registry Cleaner Software


Advanced SystemCare Free

CCleaner

Advanced System Care Free 4

Wise Registry Cleaner

Comodo System Cleaner

Auslogics Registry Cleaner

JetClean

Best Free Windows CD / DVD Burning Software


Burn Aware Free

Daemon Tools Lite

Ashampoo Burning Studio Free

ImgBurn

CD Burner XP

Alcohol 120

Free Any Burn

Friday 24 May 2013

Best Windows Backup Software


EASEUS Todo Backup

Comodo Backup

GFI Backup

Cobian Backup

Paragon Backup & Recovery Free

FBackup

EASEUS Todo Backup

Comodo Backup

Wednesday 22 May 2013

Saturday 18 May 2013

Best Free Firewall for Windows


Tiny wall firewall

ZoneAlarm Free Firewall

Private firewall

Online Armor Free Firewall

Comodo Firewall

PC Tools Outpost Firewall

PC Tools Firewall Plus

Friday 17 May 2013

FREE Online Resumes



http://resumizer.com/

FREE Resume Creator Online write and print your resume in a few simple steps, many styles and options with tips to guide you. Easily update and edit your resume, no fees or memberships required.

Thursday 16 May 2013

PARAM


PARAM is a series of supercomputers designed and assembled by the Centre for Development of Advanced Computing (C-DAC) in Pune, India. The latest machine in the series is the PARAM Yuva II.Param means supreme in Sanskrit.

PARAM Series

PARAM 8000 

PARAM 8600 

PARAM 9900/SS

PARAM 10000 

PARAM Padma

PARAM Yuva

Param Yuva II

3DTin





3DTin gives simplest user interface to create 3D models. It runs in any HTML5 browser (Firefox, Google Chrome, Safar, IE9), no matter which operating system you use. It is absolutely FREE to use and requires no experience in 3D design. All you need is the will and imagination to explore the 3D world.

Tuesday 14 May 2013

How to download videos from youtube



You can use following sites to download videos from youtube ,just by copying the video url and press download.
http://www.videograbber.net/

http://keepvid.com/

Quizlet


http://quizlet.com/

Quizlet is now among the largest educational websites in the world. Millions of teachers and students from every country in the world use Quizlet. Becausethis website is free and no limit to the number of people who could use it.

Monday 13 May 2013

Free Download Managers


FlashGet

Orbit Downloader

Star Downloader

Easy Download Manager

Download Accelerator Plus 






Saturday 11 May 2013

Best Way To Find The Perfect Laptop For You


http://swogo.com/

Swogo is a free online service which helps you make a decision like an expert in seconds.
The site will be asking 6 questions to you ,answer it.you can see the suggestions for your new lap.

Friday 10 May 2013

Free Proxy Websites for Anonymous web surfing

Ubuntu keyboard shortcuts part 5


Keyboard shortcut for Nautilus

Shift + Ctrl + N
 Create New Folder

Ctrl + T
 Delete selected file(s) to trash

Alt + ENTER
 Show File/Folder Properties

Ctrl + 1
 Toggle View As Icons

Ctrl + 2
  Toggle View As List

Shift + Right
 Open Directory (Only in List View)

Shift + Left
 Close Directory (Only in List View)

Ctrl + S
 Select Pattern

F2  
Rename File

Ctrl + A
  Select all files and folders

Ctrl + W
 Close Window

Ctrl + Shift + W
 Close All Nautilus Windows

Ctrl + R
  Reload Nautilus Window

Alt + Up
 Open parent directory

Alt + Left
 Back

Alt + Right
  Forward

Alt + Home
 go to Home folder

Ctrl + L
 go to location bar

F9
Show sidepane

Ctrl + H
 Show Hidden Files

Ctrl + +
  Zoom In

Ctrl + -
 Zoom Out

Ctrl + 0
Normal Size

Thursday 9 May 2013

Nebulae


Nebulae

Nebulae is a petascale supercomputer located at the National Supercomputing Center (Shenzhen) in Shenzhen, Guangdong, China. Built from a Dawning TC3600 Blade system with Intel Xeon X5650 processors and Nvidia Tesla C2050 GPUs, it has a peak performance of 1.271 petaflops using the LINPACK benchmark suite. Nebulae was ranked the second most powerful computer in the world in the June 2010 list of the fastest supercomputers according to TOP500. Nebulae has a theoretical peak performance of 2.9843 petaflops. It is currently the tenth most powerful supercomputer in the world and China's second most powerful. This computer is used for multipurpose.

Wednesday 8 May 2013

Ubuntu keyboard shortcuts part 4


Keyboard shortcuts for Compiz

Alt + Tab
 switch between open windows

Win + Tab
 switch between open windows with Shift Switcher or Ring Switcher effect

Win + E
  Expo, show all workspace

Ctrl + Alt + Down
  Film Effect

Ctrl + Alt + Left mouse button
  Rotate Desktop Cube

Alt + Shift + Up
  Scale Windows

Ctrl + Alt + D
  Show Desktop

Win + Left mouse button
 take screenshot on selected area

Win + Mousewheel
 Zoom In/Out

Alt + Mousewheel
 Transparent Window

Alt + F8
  Resize Window

Alt + F7
 Move Window

Win + P
 Add Helper

F9
show widget layer

Shift + F9
show water effects

Win + Shift + Left mouse button
 Fire Effects

Win + Shift + C
  Clear Fire Effects

Win + Left mouse button
 Annotate: Draw

Win + 1
 Start annotation

Win + 3
  End annotation

Win + S
 selects windows for grouping

Win + T
 Group Windows together

Win + U
 Ungroup Windows

Win + Left/Right
 Flip Windows

Tuesday 7 May 2013

Ubuntu keyboard shortcuts part 3

Keyboard shortcuts for Terminal

Ctrl + A
 Move cursor to beginning of line

Ctrl + E
 Move cursor to end of line

Ctrl + C
 kills the current process
.
Ctrl + Z
 sends the current process to the background.

Ctrl + D
 logs you out.

Ctrl + R
 finds the last command matching the entered letters.
Enter a letter, followed by Tab + Tab  lists the available commands beginning with those letters.

Ctrl + U
 deletes the current line.

Ctrl + K
 deletes the command from the cursor right.

Ctrl + W
 deletes the word before the cursor.

Ctrl + L
 clears the terminal output

Shift + Ctrl + C
 copy the highlighted command to the clipboard.

Shift + Ctrl + V (or Shift + Insert)
 pastes the contents of the clipboard.

Alt + F
 moves forward one word.

Alt + B
moves backward one word.

Arrow Up/Down
browse command history

Shift + PageUp / PageDown
Scroll terminal output

Monday 6 May 2013

Ubuntu keyboard shortcuts part 2


Keyboard shortcuts for GNOME desktop

Ctrl + Alt + F1
 Switch to the first virtual terminal

Ctrl + Alt + F2(F3)(F4)(F5)(F6)
 Select the different virtual terminals

Ctrl + Alt + F7
 Restore back to the current terminal session with X

Ctrl + Alt + Backspace
 Restart GNOME

Alt + Tab
 Switch between open programs

Ctrl + Alt + L
  Lock the screen.

Alt + F1
 opens the Applications menu

Alt + F2
 opens the Run Application dialog box.

Alt + F3
 opens the Deskbar Applet

Alt + F4
 closes the current window.

Alt + F5
 unmaximizes the current window.

Alt + F7
 move the current window

Alt + F8
 resizes the current window.

Alt + F9
 minimizes the current window.

Alt + F10
  maximizes the current window.

Alt + Space
  opens the window menu.

Ctrl + Alt + +
 Switch to next X resolution

Ctrl + Alt + -
 Switch to previous X resolution

Ctrl + Alt + Left/Right
 move to the next/previous workspace

Sunday 5 May 2013

Ubuntu keyboard shortcuts part 1


General keyboard shortcuts

Ctrl + A
Select all

Ctrl + C
Copy the highlighted content to clipboard

Ctrl + V 
Paste the clipboard content

Ctrl + N
New (Create a new document, not in terminal)

Ctrl + O 
 Open a document

Ctrl + S 
 Save the current document

Ctrl + P 
 Print the current document

Ctrl + W 
 Close the close document

Ctrl + Q 
 Quit the current application

IBM Sequoia-Supercomputer



IBM Sequoia is a petascale Blue Gene/Q supercomputer constructed by IBM for the National Nuclear Security Administration as part of the Advanced Simulation and Computing Program (ASC). It was delivered to the Lawrence Livermore National Laboratory (LLNL) in 2011 and was fully deployed in June 2012.
On 14 June 2012, the TOP500 Project Committee announced that Sequoia replaced the K computer as the world's fastest supercomputer, with a LINPACK performance of 16.32 petaflops, 55% faster than the K computer's 10.51 petaflops, having 123% more cores than the K computer's 705,024 cores. Sequoia is also more energy efficient, as it consumes 7.9 MW, 37% less than the K computer's 12.6 MW.
Record-breaking science applications have been run on Sequoia, the first to cross 10 petaflops of sustained performance. The cosmology simulation framework HACC achieved almost 14 petaflops with a 3.6 trillion particle benchmark run while the Cardioid code, which models the electrophysiology of the human heart, achieved nearly 12 petaflops with a near real-time simulation.
The entire supercomputer runs on Linux, with CNK running on over 98,000 nodes, and Red Hat Enterprise Linux running on 768 I/O nodes that are connected to the filesystem.

Windows Aero features 2


Windows + SHIFT + right arrow OR Windows + SHIFT + left arrow
Move selected window from one monitor to another. They will remain in the same relative location.

Windows + P
Select presentation display mode.

Windows + + OR Windows + -
Activates Windows Magnifier to zoom in or out of screen.

Ctrl + Alt + D
Switch to docked mode.

Ctrl + Alt + L
Switch to lense mode.

Ctrl + Alt + F
Switch from docked or lens mode back to full screen mode.

Ctrl + Alt + I
Invert colors.

Windows + Esc
Exist magnifier views
.
Windows + G
Cycle through desktop gadgets.

Windows + X
Launches Windows Mobility Center. Especially useful if you’re working on a laptop.

Saturday 4 May 2013

keyboard shortcuts for Windows 8 part 2


 Win+W                    
 Search through your settings.

Win+X                      
On the Windows 8 desktop, this displays a context menu that leads you to   various locations. It comes up on the lower left corner of the screen, where  the Windows 7 Start button used to be.

Win+Z
 Brings up the app bar in the Modern interface.

Win+Period (.)
Snaps an app to the right of the screen. Pressing "Shift" along with this  combination snaps the app to the left.

Win+Print Screen          
Takes a screenshot and saves it to your Pictures folder. Pressing "Print  Screen" on its own will just save the image to your clipboard, and you'll have  to paste it into a photo editor. This is much more convenient.

Shift+Delete
Bypass the Recycle Bin and just delete the selected file permanently.

Win+0-9  
Launch a particular application pinned to the taskbar or bring it into view.

Win+Shift+0-9
Launch a new instance of an application pinned to the taskbar. This launches a new clone even if the application is already open.

Win+Spacebar                
 Display the current language and keyboard layout. In Windows 7, this combination would show you a peek into the desktop.

Win+Ctrl+Spacebar          
Change to a previously selected input

Win+Plus (+) /Win+Minus (-)              
Opens the magnifier and zooms the view in or out, depending on the  character used. Obviously, the plus sign zooms in and the minus sign zooms out.

Win+Esc                    
Gets out of the magnifier application.

Win+Ctrl+Tab              
Cycle through open apps (except desktop apps) and snap them as they are  cycled

Win+Comma (,)              
Get a peek into the desktop. In Windows 7, the combination used to be  "Win+Spacebar."

Win+PageUp                
 Move the Start screen and apps to the monitor on the left (Apps in the   desktop won't change monitors)

Win+PageDown              
Move the Start screen and apps to the monitor on the right (apps in the desktop won't change monitors)

Win+Shift+Up    
Stretch the desktop window to the top and bottom of the screen

Win+Shift+Down
Restore/minimize active desktop windows vertically, maintaining width

Win+Home                  
Minimize all but the active desktop window (restores all windows on second stroke)

Win+Enter                  
Brings up the narrator. It will read the text you have in front of you.

Win+Start typing          
Search your PC

keyboard shortcuts for Windows 8 part 1


Win                        
Open the charms

Win+B                      
Gets you out of the Modern interface and into the desktop, then selects the tray notification area. If you're already on the desktop, this just selects the tray notification area.

Win+C
Opens the "Charms" menu. This menu allows you to quickly access Windows settings and features such as search, shutdown, and restart.

 Win+D                      
Brings you to the desktop. Pressing the key combination again will bring you back to the original active window.

 Win+E                      
 Opens Windows Explorer. This quickly lets you browse the contents of your device.

Win+F 
 Opens Search charm. It's a quick way to search through all your apps.Alternatively, you can just type away in the Start screen. The app search console appears immediately as you start typing in the Start screen.

Win+H 
Opens Share charm. Allows you to share a selected item to your friends andother people you know.

Win+I                      
Opens Settings charm. Here, you may configure PC settings such as resolution, app notifications, and user accounts.

Win+J  
 Switch the main app and snapped app

Win+K
  Opens Devices charm. Allows you to see a list of devices connected to your computer.

Win+L
 Locks the screen. You may have to log back in to the computer to unlock it. Keep this in mind when using this shortcut.

Win+M/Win+Shift+M
Minimizes every window. It works like Win+D, but it isn't reversible when you  press the combination again. You must press "Shift" along with it in order to restore the windows.

 Win+O                      
 Lock the screen orientation (portrait or landscape)

Win+P                      
Choose the display mode. You may duplicate the image on two displays,  extend the display onto a second monitor, move the image to a projector, or keep the image on one single monitor.

 Win+Q
 Search through apps installed on your computer.

Win+R
 Opens the ever-friendly "Run" dialog box for running things such as the command prompt. (An easier alternative would just be to type your search term in the Start screen)

 Win+T                      
 Cycle through pinned programs on the taskbar. If you reach a pinned   application that's not currently opened, you can open it with "Enter."

 Win+U                      
Opens the Ease of Access Center. This lets you access tools such as the  magnifier, which zooms in on portions of the screen.

Win+V /   Win+Shift+V      
Cycle through "toast" notifications. It shows you different notifications your  apps generate. "Win+Shift+V" does this in reverse

Ctrl+plus (+) or Ctrl+minus (-)                
Zoom in or out of a large number of items, like apps pinned to the Start  screen

Thursday 2 May 2013

Visual Search Engines

Controller Area Network


Controller Area Network


The Controller Area Network (CAN) is a serial bus system that was developed in the late 1980s for automotive applications by Robert Bosch GmbH, Germany. CAN was developed to support distributed control systems in automobiles and has also been implemented fairly widely in industrial control systems

Wednesday 1 May 2013

Just for fun


Open notepad

Copy these code

@echo off
:A
color 2
echo %random% %random% %random% %random% %random% %random% %random% %random%
goto A 

save as .cmd or .bat extension and run it.

HOW TO CREATE NAMELESS FOLDER OR FLILE


Create a new folder

Name the folder by pressind "Alt" and  "0160"
This will create a nameless folder.

Right click and select properties

Select the tab custoimize

Select "change icon"

Then select suitable icon and click ok




Most-Destructive Computer Viruses 3


Goner
Goner, as one of the fastest-spreading they had yet seen and warned computer users to immediately delete it if they received it.The virus mass mails itself out through e-mail and attempts to destroy anti-virus software on computers, which could prove extremely problematic for those unfortunate enough to receive it.

Flame
Flame,[a] also known as Flamer, sKyWIper,and Skywiper,is modular computer malware discovered in 2012that attacks computers running the Microsoft Windows operating system. The program is being used for targeted cyber espionage in Middle Eastern countries.

OPRAH WINFREY VIRUS
OPRAH WINFREY VIRUS: Your 200MB hard drive suddenly shrinks to 80MB, and then slowly expands back to 200MB.

AT&T VIRUS
AT&T VIRUS: Every three minutes it tells you what great service you are getting.

MCI VIRUS
MCI VIRUS: Every three minutes it reminds you that you're paying too much for the AT&T virus.

PAUL REVERE VIRUS
PAUL REVERE VIRUS: This revolutionary virus does not horse around. It warns you of impending hard disk attack---once if by LAN, twice if by C:>.

POLITICALLY CORRECT VIRUS

POLITICALLY CORRECT VIRUS: Never calls itself a "virus", but instead refers to itself as an "electronic microorganism."

RIGHT TO LIFE VIRUS
RIGHT TO LIFE VIRUS: Won't allow you to delete a file, regardless of how old it is. If you attempt to erase a file, it requires you to first see a counselor about possible alternatives.

ROSS PEROT VIRUS
ROSS PEROT VIRUS: Activates every component in your system, just before the whole darn thing quits.

MARIO CUOMO VIRUS
MARIO CUOMO VIRUS: It would be a great virus, but it refuses to run.

TED TURNER VIRUS
TED TURNER VIRUS: Colorizes your monochrome monitor.


Best Video Players


Best Video Players

VLC Media Player

Windows Media Player

KM Player

GOM Media Player

Real Player

CyberLink PowerDVD

Winamp

Tuesday 30 April 2013

COGNITIVE ROBOTICS

COGNITIVE ROBOTICS 


Cognitive robotics is then the branch of robotics that is concerned with endowing the robot with intelligent behavior by providing the robot with a processing architecture that will allow it to learn and reason about how to behave in response to complex goals in a complex world.

Sunday 28 April 2013

Best office softwares


Best office softwares 

Microsoft Office

Corel Home Office

Kingsoft Office Professional

Yozo Office 2010

Microsoft Works

Softmaker Office

Celframe Office

Ability Office

Saturday 27 April 2013

Windows Aero features 1


Windows + Spacebar 
Make all open windows transparent to view gadgets and icons on desktop.

Windows + D 
Show or hide the desktop.

Windows + Home
Minimize all but selected window. Reverse by clicking the key combination again.

Windows + left arrow OR Windows + right arrow 
Dock selected window to the left or right half of your screen.

Windows + up arrow OR Windows + down arrow
Maximized and restores the selected window.

Windows + SHIFT + up arrow OR Windows + SHIFT + down arrow
Maximizes and restores selected window in vertical dimension only.

Windows + Tab
Launch 3D representation of open windows and click Tab key again to flip through them.

Alt + Ctrl + Tag + left/right/up/down arrow
Flip window.

Alt + Tab
Cycle through open windows.

Windows + T OR Windows + SHIFT + T
Move focus to front or back of taskbar. Press T again while holding the Windows key to cycle through items in the taskbar from left to right or, with SHIFT button held too, from right to left.

Windows + B
Puts focus on the ‘show hidden icons’ button on the system tray.

Windows + 1 THROUGH Windows + 9
Launch first through ninth icon on taskbar, including items pinned to taskbar.

Windows + SHIFT + 1 THROUGH Windows + SHIFT + 9
Starts new instance of respective taskbar icon.

Windows + Ctrl + 1 THROUGH Windows + Ctrl + 9
Cycles through multiple instances of the respective icon.

Windows + Alt + 1 THROUGH Windows + Alt + 9
Opens jump list for respective icon.


Websites to Learn programming online


Websites to Learn programming online

http://www.codecademy.com/

http://www.w3schools.com/

http://www.pickatutorial.com/

http://www.learnstreet.com/

http://www.pickatutorial.com/

http://www.programr.com/

http://w3processing.com/

http://www.code.org/

http://codingbat.com/

http://www.codeschool.com/

Thursday 25 April 2013

If This Then That


If This Then That

Webapp automating service If This Then That (IFTTT) lets you create recipes that pull information from one webapp and use it in another.

simple and cool

https://ifttt.com/

Most-Destructive Computer Viruses 2


Most-Destructive Computer Viruses 2

RSPlug
The RSPlug Trojan horse, a form of DNSChanger, is malware targeting the Mac OS X operating system. The first incarnation of the trojan, OSX.RSPlug.A, was discovered on October 30, 2007 by the Mac security experts at Intego.

Storm Worm
The Storm Worm (dubbed so by the Finnish company F-Secure) is a backdoor Trojan horse that affects computers using Microsoft operating systems discovered on January 17, 2007.

Fizzer
Fizzer is a multiple vector worm that topped virus/worm charts in 2003. It was comparable to Nimda in a few ways, as it "infected" files like a virus and had more than one way of spreading.

SQL Slammer
SQL Slammer is a computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic, starting at 05:30 UTC on January 25, 2003. It spread rapidly, infecting most of its 75,000 victims within ten minutes.

Blaster Worm
The Blaster Worm (also known as Lovsan, Lovesan or MSBlast) was a computer worm that spread on computers running the Microsoft operating systems: Windows XP and Windows 2000, during August 2003.

Code Red
Code Red was a computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft's IIS web server.The Code Red worm was first discovered and researched by eEye Digital Security employees Marc Maiffret and Ryan Permeh.

ILOVEYOU
ILOVEYOU,  Love Letter, was a computer worm that attacked tens of millions of Windows personal computers on and after 5 May 2000 local time in the Philippines when it started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.txt.vbs". The latter file extension (in this case, 'VBS' - a type of interpreted file) was most often hidden by default on Windows computers of the time, leading unwitting users to think it was a normal text file. Opening the attachment activated the Visual Basic script. The worm did damage on the local machine, overwriting image files, and sent a copy of itself to the first 50 addresses in the Windows Address Book used by Microsoft Outlook.

Concept virus
The name Concept virus refers to two different pieces of computer malware, each of which has acted as a proof of concept for a new method of propagation:WM.Concept (1995), the first macro virus to spread through Microsoft Word (though not the first macro virus per-se)Nimda (2001), named Concept Virus by its author, one of the first multi-vector Windows viruses.

Morris worm
The Morris worm or Internet worm of November 2, 1988 was one of the first computer worms distributed via the Internet. It is considered the first worm and was certainly the first to gain significant mainstream media attention. It also resulted in the first conviction in the US under the 1986 Computer Fraud and Abuse Act.It was written by a student at Cornell University, Robert Tappan Morris, and launched on November 2, 1988 from MIT.

Spacefiller
CIH, also known as Chernobyl or Spacefiller, is a Microsoft Windows computer virus which first emerged in 1998. It is one of the most damaging viruses, overwriting critical information on infected system drives, and more importantly, in some cases corrupting the system BIOS. The virus was created by Chen Ing-hau who was a student at Tatung University in Taiwan.60 million computers were believed to be infected by the virus internationally, resulting in an estimated $1 billion US dollars in commercial damages.


Wednesday 24 April 2013

Best Anti-Virus software


Best Anti-Virus software 

Avira AntiVir

Avast! Free Antivirus

AVG Anti-Virus

Avira AntiVir

Bitdefender Antivirus

ClamWin 0.97.7

ESET NOD32 AntiVirus

Immunet Protect Free 3.0.8.9025

Kaspersky Anti-Virus

McAfee Anti-Virus

Norton AntiVirus

quick heal antivirus

Panda Cloud Antivirus

Tuesday 23 April 2013

Desktop Widgets


Desktop Widgets 

Alt-Tab Thingy 4.0.4
If you are not familiar with the Alt-Tab task switcher in Windows, it's a keyboard short-cut (hot-key) to enable fast switching between applications

Dexpot 1.6.7
Dexpot turns your monitor into up to 20. Dexpot creates additional workspaces you can quickly switch between.

Fences 2.1
Fences is a program that helps you organize your desktop, and can hide your icons when they're not in use.

Growl 2.0.9
Growl for Windows is developed completely with the end user in mind. If you have any questions, comments, or suggestions, please drop us a line and let us hear your thoughts.

Rainlendar 2.12 Beta 130
Rainlendar is a customizable calendar that displays the current month. It is a very lightweight application that doesn't use much system resources

Samurize 1.64.3
Samurize is the popular advanced system monitoring and desktop enhancement engine for Windows.

TaskSwitchXP 2.0.11
TaskSwitchXP is an advanced task management utility that picks up where the standard Windows Alt+Tab switcher leaves off.

WindowBlinds 7.4
WindowBlinds is a software utility that allows you to completely change the look and feel of Microsoft Windows.

Yahoo! Widget Engine 4.5.2
Yahoo! Widgets help you save time and stay current by bringing an always-updated,.

Websites for teachers


websites for teachers

http://www.timesaversforteachers.com/
TIMESAVERS for TEACHERS specializes in report card comments/end of year remarks, printable classroom forms, worksheets, spelling activities, practical teacher tools, and downloadable teacher resources that improve classroom management, saving teachers valuable time. Be well organized and a better prepared teacher by using these 11 Popular Books in your classroom… and have more time for other things in life.

http://www.kubbu.com/
kubbu ian e-learning tool designed to facilitate teachers work and enhance the learning process

http://www.teach4real.com/
A blog for Real Teachers in our Toughest Schools. Public high school teacher Matt Amaral gives you advice you've never heard on how to teach in the ghetto. If you've been wondering who out there is REALLY talking about our schools, check this out.

http://www.fiftysneakers.com/
Fifty Sneakers is a secure, easy-to-use, online application for teachers, instructors, and homeschoolers. Fifty Sneakers acts as an online home for everything from lecture notes to exams or studysheets to images, video, and test questions.

Monday 22 April 2013

Best Video Editing Softwares

Video Editing Softwares 

Adobe Premiere Elements

MAGIX Movie Edit Pro

Sony Movie Studio Platinum Suite

Roxio Creator

VideoPad

AVS Video Editor

Pinnacle Studio

Sony Movie Studio Platinum

Corel VideoStudio Pro X6

Windows Movie Maker 2012

Kate's Video Toolkit

CyberLink PowerDirector

Avidemux

VSDC Free Video Editor

MPEG Streamclip 1.2.1b6

VirtualDub

Free Video Dub

Lightworks

Freemake Video Converter

MoviePlus

Sony Movie Studio

Corel DVD Movie Factory

PowerProducer

Nero Video

Safe computing tips

Safe computing tips
  1. Set up your computer for automatic software and operating system updates.
  2. Install protective software.
  3. Choose strong passwords.
  4. Backing up your machine regularly.
  5. Control access to your machine.
  6. Use email and the Internet safely.
  7. Use secure connections.
  8. Protect sensitive data.
  9. Use desktop firewalls.
  10. Stay informed with the latest developments.

Sunday 21 April 2013

Desktop Launchers



Desktop Launchers

Google Desktop 5.9.1005.12335
Google Desktop makes searching your computer as easy as searching the web with Google.

Launchy 2.5
Launchy is a free windows utility designed to help you forget about your start menu, the icons on your desktop, and even your file manager.
 
Nexus 12.02.0995
The Winstep Nexus Dock is a FREE professional dock for Windows. With Nexus, your most frequently used applications are only a mouse click away - and Nexus turns working with your computer into a fun and exciting experience.

ObjectDock 2.0
ObjectDock is a program that adds a skinnable dock to your Windows desktop. It is one of the most popular desktop enhancement programs available.

RocketDock 1.3.5
RocketDock is a smoothly animated, alpha blended application launcher. It provides a nice clean interface to drop shortcuts on for easy access

Y'z Dock 0.8.3
Y'z Dock is a program toolbar, very much like the dock in MacOS X. It is no longer being updated but still has a very large user base.

RK Launcher
RK Launcher is a free dock utility for Windows that provides a visually pleasing bar on the edge of your screen to which you can easily add shortcuts to programs, files and folders.

XWindows Dock
XWindows Dock is a free dock program for Windows that emulates the Mac launcher toolbar. It’s completely customizable and contains graphics effects like reflections, transparency, shadow, blur, etc.

Circle Dock
Circle Dock is a free, circular dock program for Windows, but different from Sliderdock. When you activate Circle Dock, it can display right at your mouse cursor, even if your mouse is at the edge of the screen.

Sliderdock
SliderDock is a freeware application launcher for the Windows OS. Unlike other similar docking programs, SliderDock uses a wheel-like interface to organize icons.

Destructive Computer Viruses 1

Destructive Computer Viruses
Stuxnet
Stuxnet is a computer worm discovered in June 2010 that is believed to have been created by the United States and Israel to attack Iran's nuclear facilities.Stuxnet initially spreads via Microsoft Windows, and targets Siemens industrial software and equipment.It is the first discovered malware that spies on and subverts industrial systems, and the first to include a programmable logic controller (PLC) rootkit.

Zeus
Zeus is a Trojan horse that steals banking information by Man-in-the-browser keystroke logging and Form Grabbing. Zeus is spread mainly through drive-by downloads and phishing schemes. First identified in July 2007 when it was used to steal information from the United States Department of Transportation, it became more widespread in March 2009.

Conficker
Conficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008. It uses flaws in Windows software and dictionary attacks on administrator passwords to propagate while forming a botnet, and has been unusually difficult to counter because of its combined use of many advanced malware techniques. The Conficker infected millions of computers including government, business and home computers in over 200 countries, making it the largest known computer worm infection since the 2003 Welchia.

Agent.btz
AWF (or Agent. AWF or Agent.btz) is a malicious Trojan Downloader affecting the Microsoft Windows Operating SystemAgent. AWF displays virus activity as it that replaces files on a user's computer with a copy of itself, and moves the original, legitimate file to a bak sub-folder. It is known to attempt to terminate security software, and the Trojan downloads a Backdoor onto the computer, allowing the attacker to further compromise the computer. It is also known to modify the Windows registry.

PoisonIvy 
PoisonIvy (2005) PoisonIvy is a computer security nightmare; it allows the attacker to secretly control the infected user’s computer. Malware like PoisonIvy is known as a “remote access trojan,” because it provides full control to the perpetrator through a backdoor.

Mydoom
Mydoom, also known as W32.MyDoom@mm, Novarg, Mimail.R and Shimgapi is a computer worm affecting Microsoft Windows. It was first sighted on 26 January 2004. It became the fastest-spreading e-mail worm ever (as of January 2004), exceeding previous records set by the Sobig worm and ILOVEYOU.

Netsky

Netsky is a prolific family of computer worms which affect Microsoft Windows operating systems. The first variant appeared on Monday, February 16, 2004. The "B" variant was the first family member to find its way into mass distribution. It appeared on Wednesday, February 18, 2004. 18-year-old Sven Jaschan of Germany confessed to having written these, and other worms, such as Sasser.

Anna Kournikova
The Anna Kournikova computer worm was a computer worm authored by the Dutch programmer Jan de Wit on February 11, 2001. It was designed to trick email users into opening a mail message purportedly containing a picture of tennis player Anna Kournikova, while actually hiding a malicious program.

Sasser
Sasser is a computer worm that affects computers running vulnerable versions of the Microsoft operating systems Windows XP and Windows 2000. Sasser spreads by exploiting the system through a vulnerable network port (as do certain other worms). Thus it is particularly virulent in that it can spread without user intervention, but it is also easily stopped by a properly configured firewall or by downloading system updates from Windows Update.

Melissa virus
The Melissa virus, also known as "Mailissa", "Simpsons", "Kwyjibo", or "Kwejeebo", is a mass-mailing macro virus. As it is not a standalone program, it is not a worm.First found on March 26, 1999, Melissa shut down Internet E-mail systems that got clogged with infected e-mails propagating from the virus. Melissa was not originally designed for harm, but it overloaded servers and caused problems.


Saturday 20 April 2013

Remote Desktop Connection Navigation


Remote Desktop Connection Navigation

CTRL+Alt+END (Open the m*cro$oft Windows NT Security dialog box)

Alt+PAGE UP (Switch between programs from left to right)

Alt+PAGE DOWN (Switch between programs from right to left)

Alt+INSERT (Cycle through the programs in most recently used order)

Alt+HOME (Display the Start menu)

CTRL+Alt+BREAK (Switch the client computer between a window and a full screen)

Alt+Delete (Display the Windows menu)

CTRL+Alt+- (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)

CTRL+Alt++ (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing Alt+PRINT SCREEN on a local computer.)

Internet Explorer Navigation


Internet Explorer Navigation

CTRL+B (Open the Organize Favorites dialog box)

CTRL+E (Open the Search bar)

CTRL+F (Start the Find utility)

CTRL+H (Open the History bar)

CTRL+I (Open the Favorites bar)

CTRL+L (Open the Open dialog box)

CTRL+N (Start another instance of the browser with the same Web address)

CTRL+O (Open the Open dialog box, the same as CTRL+L)

CTRL+P (Open the Print dialog box)

CTRL+R (Update the current Web page)

CTRL+W (Close the current window)



MMC Console Window Keyboard Shortcuts




MMC Console Window Keyboard Shortcuts


CTRL+P (Print the current page or active pane)

Alt+- (Display the window menu for the active console window)

Shift+F10 (Display the Action shortcut menu for the selected item)

F1 key (Open the Help topic, if any, for the selected item)

F5 key (Update the content of all console windows)

CTRL+F10 (Maximize the active console window)

CTRL+F5 (Restore the active console window)

Alt+Enter (Display the Properties dialog box, if any, for the selected item)

F2 key (Rename the selected item)

CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)

Friday 19 April 2013

HOW TO MAKE SYMBOLS WITH KEYBOARD


HOW TO MAKE SYMBOLS WITH KEYBOARD
Alt + 0153..... ™... trademark symbol
Alt + 0169.... ©.... copyright symbol
Alt + 0174..... ®....registered ­ trademark symbol
Alt + 0176 ...°......degre ­e symbol
Alt + 0177 ...±....plus-or ­-minus sign
Alt + 0182 ...¶.....paragr ­aph mark
Alt + 0190 ...¾....fractio ­n, three-fourths
Alt + 0215 ....×.....multi ­plication sign
Alt + 0162...¢....the ­ cent sign
Alt + 0161.....¡..... ­.upside down exclamation point
Alt + 0191.....¿..... ­upside down question mark
Alt + 1.......☺....sm ­iley face
Alt + 2 ......☻.....bla ­ck smiley face
Alt + 15.....☼.....su ­n
Alt + 12......♀.....f ­emale sign
Alt + 11.....♂......m ­ale sign
Alt + 6.......♠.....s ­pade
Alt + 5.......♣...... ­Club
Alt + 3.......♥...... ­Heart
Alt + 4.......♦...... ­Diamond
Alt + 13......♪.....e ­ighth note
Alt + 14......♫...... ­beamed eighth note
Alt + 8721.... ∑.... N-ary summation (auto sum)
Alt + 251.....√.....s ­quare root check mark
Alt + 8236.....∞..... ­infinity
Alt + 24.......↑..... ­up arrow
Alt + 25......↓...... ­down arrow
Alt + 26.....→.....ri ­ght arrow
Alt + 27......←.....l ­eft arrow
Alt + 18.....↕......u ­p/down arrow
Alt + 29......↔...lef ­t right arrow

Thursday 18 April 2013

How to clear your all internet activity history.


How to clear your all internet activity history.
    Go to RUN
    Type inetcpl.cpl
    OK
    It will clear browsing history, cookies & offline data.

Top Web Browsers


Web Browsers

Google Chrome Web Browser
FireFox Web Browser
Internet Explorer Web Browser
Safari Web Browser
Opera Web Browser
Maxthon Browser
Rockmelt browser
Wyzo - The Media Browser
Epic Web Browser
Tor Web Browser
Netscape Web Browser
Amaya Web Browser
Flock Web Browser
SeaMonkey Web Browser
K-Meleon Web Browser
MyIE2 Web Browser
Crazy Web Browser
Avant Web Browser
DeepNet Web Browser
NetCaptor Web Browser

Green Web Browser
Sleipnir Web Browser
TouchNet Web Browser

Wednesday 17 April 2013

Shortcut Keys For Character Map


Shortcut Keys For Character Map

After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:

RIGHT ARROW (Move to the right or to the beginning of the next line)

LEFT ARROW (Move to the left or to the end of the previous line)

UP ARROW (Move up one row)

DOWN ARROW (Move down one row)

PAGE UP (Move up one screen at a time)

PAGE DOWN (Move down one screen at a time)

HOME (Move to the beginning of the line)

END (Move to the end of the line)

CTRL+HOME (Move to the first character)

CTRL+END (Move to the last character)

Spacebar (Switch between Enlarged and Nor mal mode when a character is selected)

Microsoft Management Console (MMC) Main Window Keyboard Shortcuts



Microsoft Management Console (MMC) Main Window Keyboard Shortcuts

CTRL+O (Open a saved console)

CTRL+N (Open a new console)

CTRL+S (Save the open console)

CTRL+M (Add or remove a console item)

CTRL+W (Close window/tab)

F5 key (Update the content of all console windows)

Alt+Spacebar (Display the MMC window menu)

Alt+F4 (Close the console)

Alt+A (Display the Action menu)

Alt+V (Display the View menu)

Alt+F (Display the File menu)

Alt+O (Display the Favorites menu)

Windows Explorer Keyboard Shortcuts


Windows Explorer Keyboard Shortcuts

END (Display the bottom of the active window)

HOME (Display the top of the active window)

NUM LOCK+* (Display all of the subfolders that are under the selected folder)

NUM LOCK++ (Display the contents of the selected folder)

NUM LOCK+- (Collapse the selected folder)

LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)

RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)

Microsoft Natural Keyboard Shortcuts


Microsoft Natural Keyboard Shortcuts


Win (Display or hide the Start menu)
Microsoft Natural Keyboard Shortcuts

Win+BREAK (Display the System Properties dialog box)

Win+D (Display the desktop)

Win+M (Minimize all of the windows)

Win+Shift+M (Restore the minimized windows)

Win+E (Open My Computer)

Win+F (Search for a file or a folder)

CTRL+Win+F (Search for computers)

Win+F1 (Display Windows Help)

Win+ L (Lock the keyboard)

Win+R (Open the Run dialog box)

Win+U (Open Utility Manager)

Accessibility Keyboard Shortcuts


Accessibility Keyboard Shortcuts

Right Shift for eight seconds (Switch FilterKeys either on or off)

Left Alt+left Shift+PRINT SCREEN (Switch High Contrast either on or off)

Left Alt+left Shift+NUM LOCK (Switch the MouseKeys either on or off)

Shift five times (Switch the StickyKeys either on or off)

NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Win +U (Open Utility Manager)

Tuesday 16 April 2013

Dialog Box Keyboard Shortcuts



Dialog Box Keyboard Shortcuts

CTRL+Tab (Move forward through the tabs)

CTRL+Shift+Tab (Move backward through the tabs)

Tab (Move forward through the options)

Shift+Tab (Move backward through the options)

Alt+Underlined letter (Perform the corresponding command or select the corresponding option)

Enter (Perform the command for the active option or button)

Spacebar (Select or clear the check box if the active option is a check box)

Arrow keys (Select a button if the active option is a group of option buttons)

F1 key (Display Help)

F4 key (Display the items in the active list)

Backspace (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

General Shortcuts


The General Shortcuts


CTRL+C (Copy)

CTRL+X (Cut)

CTRL+V (Paste)

CTRL+Z (Undo)

Delete (Delete)

Shift+Delete (Delete the selected item permanently without placing the item in the Recycle Bin)

CTRL while dragging an item (Copy the selected item)

CTRL+Shift while dragging an item (Create a shortcut to the selected item)

F2 key (Rename the selected item)

CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)

CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)

CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)

CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)

CTRL+Shift with any of the arrow keys (Highlight a block of text)

Shift with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)

CTRL+A (Select all)

F3 key (Search for a file or a folder)

Alt+Enter (View the properties for the selected item)

Alt+F4 (Close the active item, or quit the active program)

Alt+Enter (Display the properties of the selected object)

Alt+Spacebar (Open the shortcut menu for the active window)

CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)

Alt+Tab (Switch between the open items)

Alt+ESC (Cycle through items in the order that they had been opened)

F6 key (Cycle through the screen elements in a window or on the desktop)

F4 key (Display the Address bar list in My Computer or Windows Explorer)

Shift+F10 (Display the shortcut menu for the selected item)

Alt+Spacebar (Display the System menu for the active window)

CTRL+ESC (Display the Start menu)

Alt+Underlined letter in a menu name (Display the corresponding menu)

Underlined letter in a command name on an open menu (Perform the corresponding command)

F10 key (Activate the menu bar in the active program)

RIGHT ARROW (Open the next menu to the right, or open a submenu)

LEFT ARROW (Open the next menu to the left, or close a submenu)

F5 key (Update the active window)

Backspace (View the folder one level up in My Computer or Windows Explorer)

ESC (Cancel the current task)

Shift when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)



How to see your own mobile number?


How to see your own mobile number?

docomo *580#
airtel *121*9#
Reliance *1#
Vodafone *777*0#
bsnl *1#
idea *1#
aircel *888#
virgin mobile *1#
videocon *1#

Text file extensions


Text files contain textual data and may be saved in plain text or rich text formats. While most text files are documents created and saved by users, they can also be used by software developers to store program data. Examples of text files include word processing documents, log files, and saved email messages.

.doc Microsoft Word Document
.docx Microsoft Word Open XML Document
.log Log File
.msg Outlook Mail Message
.odt OpenDocument Text Document
.pages Pages Document
.rtf Rich Text Format File
.tex LaTeX Source Document
.txt Plain Text File
.wpd WordPerfect Document
.wps Microsoft Works Word Processor Document
.abw AbiWord Document
.bib BibTeX Bibliography Database
.dotx Word Open XML Document Template
.eml E-Mail Message
.fdx Final Draft Document
.gdoc Google Drive Document
.lst Data List
.sig Signature File
.sty LaTeX Style
.wps Kingsoft Writer Document
.wpt WordPerfect Template
.yml YAML Document
.aim AIMMS ASCII Model File
.ans ANSI Text File
.asc ASCII Text File
.ase Autodesk ASCII Scene Export File
.aww Ability Write Document
.bad Exchange Badmail File
.bdp Exchange Diagnostic Message
.bdr Exchange Non-Delivery Report Body File
.bean Bean Rich Text Document
.bib Bibliography Document
.bna Barna Word Processor Document
.boc EasyWord Big Document
.btd Business-in-a-Box Document
.bzabw Compressed AbiWord Document
.charset Character Set
.chord Song Chords File
.cnm NoteMap Outline File
.crwl Windows Crawl File
.cyi Clustify Input File

.diz Description in Zip File
.dne Netica Text File
.doc WordPad Document
.docm Word Open XML Macro-Enabled Document
.dotm Word Open XML Macro-Enabled Document Template
.dvi Device Independent Format File
.dx DEC WPS Plus File
.emlx Mail Message
.emulecollection eMule Data File
.err Error Log File
.etf ENIGMA Transportable File
.fbl CADfix Command Level Log File
.fcf Final Draft Converter File
.fdr Final Draft Document
.fdt Final Draft 5-7 Template
.fdxt Final Draft 8 Template
.flr Flare Decompiled ActionScript File
.fodt OpenDocument Flat XML Document
.fpt FoxPro Table Memo
.frt FoxPro Report Memo
.gpn GlidePlan Map Document
.gsd General Station Description File
.gthr Gather Log File
.gv Graphviz DOT File

.hht Help and Support Center HHT File
.hs Java HelpSet File
.hwp Hanword Document
.idx Outlook Express Mailbox Index File
.kes Kurzweil 3000 Document
.klg Log File
.klg KOFIA Log
.knt KeyNote Note File
.kon Yahoo! Widget XML File
.kwd KWord Document
.lbt FoxPro Label Memo
.lis SQR Output File
.lnt Laego Note Taker File
.lp2 iLEAP Word Processing Document
.lst FoxPro Documenting Wizard List
.ltx LaTeX Document
.luf Lipikar Uniform Format File
.lwp Lotus Word Pro Document
.lxfml LEGO Digital Designer XML File
.lyx LyX Document
.mbox E-mail Mailbox File
.mell Mellel Word Processing File
.mellel Mellel Word Processing Document
.mnt FoxPro Menu Memo
.mwd MarinerWrite Document
.mwp Lotus Word Pro SmartMaster File
.nfo Warez Information File
.njx NJStar Document
.notes Memento Notes File
.ofl Ots File List
.ott OpenDocument Document Template
.p7s Digitally Signed Email Message
.pages-tef Pages iCloud Document
.pjt FoxPro Project Memo
.psw Pocket Word Document
.pwd Pocket Word Document
.pwi Pocket Word Document
.qdl QDL Program
.qpf QuickPad Encrypted Document

.readme Readme File
.ris Research Information Systems Citation File
.rpt Generic Report
.rst reStructuredText File
.rtd RagTime Document
.rtfd Rich Text Format Directory File
.rzk File Crypt Password File
.rzn Red Zion Notes File
.safetext SafeText File
.scriv Scrivener Document
.scrivx Scrivener XML Document
.sct FoxPro Form Memo
.scw Movie Magic Screenwriter Document
.sdw StarOffice Writer Text Document
.sgm SGML File
.sla Scribus Document
.sla.gz Scribus Compressed Document
.sms Exported SMS Text Message
.ssa Sub Station Alpha Subtitle File
.story Storyist Document
.strings Text Strings File
.sub Subtitle File
.sxw StarOffice Writer Document
.tab Guitar Tablature File
.tdf Xserve Test Definition File
.tdf Guide Text Definition File
.template Apple Pages Template
.text Plain Text File
.textclipping Mac OS X Text Clipping File
.tmd TextMaker Document
.u3i U3 Application Information File
.unauth SiteMinder Unauthorized Message File
.unx Unix Text File
.uot Uniform Office Document
.utf8 Unicode UTF8-Encoded Text Document
.utxt Unicode Text File
.vct Visual Class Library Memo
.webdoc Box.net Web Document
.wpa ACT! Word Processing Document
.wpd ACT! 2 Word Processing Document
.xbdoc Xiosis Scribe Document
.xdl XML Schema File
.xdl Oracle Expert Definition Language File
.xwp Xerox Writer Text Document
.xwp XMLwriter Project
.xy3 XYWrite III Document
.xyp XYWrite Plus Document
.xyw XYWrite for Windows Document
.zabw Compressed AbiWord Document File
.1st Readme File
.act FoxPro Documenting Wizard Action Diagram
.apt Almost Plain Text File
.asc Autodesk ASCII Export File
.aty Association Type Placeholder
.awp Ability Write Template
.awt AbiWord Template
.bbs Bulletin Board System Text
.brx Beam Report Document
.cod Atlantis Word Processor Encrypted Document
.cws Claris Works Template
.dgs Dagesh Pro Document
.dsv DeSmuME Save File
.epp EditPad Pro Project
.err FoxPro Compilation Error
.fdf Acrobat Forms Data Format
.fds Final Draft Secure Copy
.hz Chinese (Hanzi) Text
.jis Japanese Industry Standard Text
.mw MacWrite Text Document
.ndoc Naver Word
.nwctxt NoteWorthy Composer Text File
.ocr FAXGrapper Fax Text File
.odm OpenDocument Master Document
.ort Rich Text Editor Document
.pfx First Choice Word Processing Document
.pmo Pegasus Saved Message File
.prt Printer Output File
.pvj ProofVision Job Ticket
.pvm Photo Video Manifest File
.pwdp Password Pad Document
.pwdpl Password Pad Lite Document

.rtx Rich Text Document
.run Runscanner Scan File
.sam Ami Pro Document
.scc Scenarist Closed Caption File
.scm Schema File
.sdm StarOffice Mail Message
.smf StarMath Formula File
.stw StarOffice Document Template
.sxg OpenOffice.org Master Document
.tab Tab Separated Data File
.tlb VAX Text Library
.tm TeXmacs Document
.tmv TextMaker Template
.tpc Topic Connection Placeholder
.tvj TrueView Job Ticket
.uof Uniform Office Document
.vnt Mobile Phone vNote File
.wbk WordPerfect Workbook
.wp WordPerfect Document
.wp4 WordPerfect 4 Document
.wp5 WordPerfect 5 Document
.wp7 WordPerfect 7 Document
.wpt Kingsoft Writer Template
.wri Windows Write Document
.xbplate Xiosis Scribe Template
.ascii ASCII Text File
.dca DisplayWrite Document
.docxml Microsoft Word XML Document
.docz ThinkFree Online Note Document
.dox MultiMate Document
.dsc Text Description File
.etx Structure Enhanced Text (Setext) File
.euc Extended Unix Code File
.faq Frequently Asked Questions Document
.fft Final Form Text File
.fwdn fWriter Document
.hwp Hangul (Korean) Text Document
.iil CleanSweep Installation Log
.ipf OS/2 Help File
.jarvis Jarvis Subscriber File
.jp1 Japanese (Romaji) Text File
.jrtf JAmes OS Rich Text File
.latex LaTeX Document
.ltr Letter File
.lue Norton LiveUpdate Log File
.lyt TurboTax Install Log File
.man Unix Manual
.me Readme Text File
.now  Readme File
.odif Open Document Interchange Format
.odo Online Operating System Write Document
.openbsd OpenBSD Readme File
.prt Crypt Edit Protected Text Format File
.rad Radar ViewPoint Radar Data
.rft Revisable Form Text Document
.saf SafeText File
.save Nano Temporary Save File
.sdoc Satra Khmer Document
.thp TurboTax Text String
.upd Program Update Information
.vw Volkswriter Text File
.wn WriteNow Text Document
.wp6 WordPerfect 6 Document
.wpd 602Text Word Processing Document
.wpl DEC WPS Plus Text Document
.wpw WP Works Word Processor File
.wsd WordStar Document
.wtx Text Document
.xwp Crosstalk Session File
.xy XYWrite Document
.zw Chinese Text File